Hierarchical abnormal-node detection using fuzzy logic for ECA rule-based wireless sensor networks

Nesrine Berjab, Hieu Hanh Le, Chia Mu Yu, Sy Yen Kuo, Haruo Yokota

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

The Internet of things (IoT) is a distributed, networked system composed of many embedded sensor devices. Unfortunately, these devices are resource constrained and susceptible to malicious data-integrity attacks and failures, leading to unreliability and sometimes to major failure of parts of the entire system. Intrusion detection and failure handling are essential requirements for IoT security. Nevertheless, as far as we know, the area of data-integrity detection for IoT has yet to receive much attention. Most previous intrusion-detection methods proposed for IoT, particularly for wireless sensor networks (WSNs), focus only on specific types of network attacks. Moreover, these approaches usually rely on using precise values to specify abnormality thresholds. However, sensor readings are often imprecise and crisp threshold values are inappropriate. To guarantee a lightweight, dependable monitoring system, we propose a novel hierarchical framework for detecting abnormal nodes in WSNs. The proposed approach uses fuzzy logic in event-condition-Action (ECA) rule-based WSNs to detect malicious nodes, while also considering failed nodes. The spatiotemporal semantics of heterogeneous sensor readings are considered in the decision process to distinguish malicious data from other anomalies. Following our experiments with the proposed framework, we stress the significance of considering the sensor correlations to achieve detection accuracy, which has been neglected in previous studies. Our experiments using real-world sensor data demonstrate that our approach can provide high detection accuracy with low false-Alarm rates. We also show that our approach performs well when compared to two well-known classification algorithms.

Original languageEnglish
Title of host publicationProceedings - 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing, PRDC 2018
PublisherIEEE Computer Society
Pages289-298
Number of pages10
ISBN (Electronic)9781538657003
DOIs
StatePublished - 02 07 2018
Externally publishedYes
Event23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018 - Taipei, Taiwan
Duration: 04 12 201807 12 2018

Publication series

NameProceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC
Volume2018-December
ISSN (Print)1541-0110

Conference

Conference23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018
Country/TerritoryTaiwan
CityTaipei
Period04/12/1807/12/18

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Keywords

  • Data integrity attack
  • Dependability
  • ECA rules
  • Fuzzy logic
  • Internet of Things
  • Security
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Hierarchical abnormal-node detection using fuzzy logic for ECA rule-based wireless sensor networks'. Together they form a unique fingerprint.

Cite this